Sentinel-One / sack-cve-fixerLinks
SentinelOne's SACK CVE Fixer
☆22Updated 5 years ago
Alternatives and similar repositories for sack-cve-fixer
Users that are interested in sack-cve-fixer are comparing it to the libraries listed below
Sorting:
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- List CVEs and details that apply to your infrastructure (pre-inventoried).☆10Updated 4 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 6 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated this week
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆30Updated 4 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- ☆21Updated 2 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated 2 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 6 years ago
- OSINT tool to evaluate the trustworthiness of a company☆42Updated 5 years ago
- A CLI tool for querying passive DNS services☆41Updated last year
- Six Degrees of Domain Admin☆15Updated 7 years ago
- Best practices in threat intelligence☆47Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 6 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- A series of Bro Scripts created for detection purposes.☆19Updated 8 years ago